Posted by Andrew Stiles

Are Trump and Bibi the greatest duo since Fat Man and Little Boy?
Why Operation Midnight Hammer was a win for female empowerment.
Anti-capitalist terror sympathizer wins Dem primary.
Even woke freaks deserve love.

It's Friday, June 27, 2025

Noble Don earns Nobel nod: America's greatest president, Donald Trump, is the prohibitive frontrunner to win the Nobel Peace Prize after ending the 12-Day War with an overwhelming victory for the good guys. Some may try to argue otherwise, but they don't know what the f— they're doing. Do you understand that? Trump knows that true peace can only be achieved with big, beautiful bombs. That's why he ordered a squadron of B-2 bombers to completely obliterate Iran's nuclear facilities as part of Operation Midnight Hammer, an important first step toward achieving lasting peace in the region.

Doing what comes naturally, the liberal journalists at CNN, a failing media network, insinuated that the strikes had failed to achieve their objective. Turns out they don't know what the f— they're doing either. This is the same network that celebrated the "fiery but mostly peaceful protests" in 2020. Earlier this week, CNN's Erin Burnett touted the "friendliness" of Iranians chanting "death to America" in the streets of Tehran.

The strikes were a stunning success, not only from a military perspective but also in the context of Trump's unyielding commitment to female empowerment and inclusive equity. Despite the fact that women are notoriously inept behind the wheel of an automobile, Trump didn't think twice about trusting a female B-2 pilot to carry out the daring strike and deliver a crippling blow to one of the most toxically masculine regimes on Earth.

The woke libs want us to believe that real feminism is about voting for Hillary Clinton and watching the WNBA. They're wrong. Real feminism is the joy that fills the hearts of little girls across the country when they learn that someone who looked like them was responsible for pummeling our enemies into submission with 60,000 pounds of precision-guided American greatness.

Representation matters.

Blowing Up Barriers: Trump Cements Legacy as Champion of Women's Empowerment

No one vibes until Daddy arrives: Trump is winning so hard even his fiercest opponents are sucking up to him. No one would accuse the president of being on great terms with NATO, but this week the cycling Dutch boy in charge of the alliance, Mark Rutte, applauded Trump's effort to deliver peace through strength. "Daddy has to sometimes use strong language," he said during a joint press conference with Trump, who said later when asked about Rutte's comments: "He did it very affectionately. 'Daddy, you're my daddy.'"

Joe Biden's secretary of state, Antony Blinken, praised the strikes on Iran's nuclear facilities and tried to claim credit for helping to plan the operation. Even former speaker Nancy Pelosi defended Trump's decision after Alexandria Ocasio-Cortez called for his impeachment. Trump's former 2016 rival, "Low Energy" Jeb Bush, said the strike on Iran was "an act of courage." Trump, who previously described Jeb as a "sad and pathetic person" who was "an embarrassment to his family," thanked the former governor for his support.

Alas, the Obama bros could not be swayed. They went ballistic after Trump bombed their friends in the Iranian regime, and have yet to calm down. We're pretty sure Barack Obama is also upset, but mostly because his wife hates him.

Fact check: After announcing the strike on Iran, Trump praised the cooperation of Israeli prime minister Benjamin Netanyahu. "We worked as a team, like perhaps no team has ever worked before," the president said.

Mostly true.

Ladies and gentleman, the Democrats: Zohran Mamdani, the radical leftist terrorist sympathizer and "defund the police" advocate, is poised to become the next mayor of New York City after defeating former governor Andrew Cuomo in the Democratic primary on Tuesday. Seriously, those were the best two options the party had to offer.

Mamdani recently defended the phrase, "globalize the intifada," seen by many as a call to violence against Jews. One of his top aides is a fan of Luigi Mangione, the lunatic who gunned down a health care executive in Manhattan. That's probably why Taylor Lorenz, the deranged left-wing journalist who has praised Mangione as a "morally good man," announced on social media that she no longer planned to kill herself.

Spotted: Ella Emhoff, the weirdo stepdaughter of failed vice president Kamala Harris, at the Mamdani victory party.

Point: Obama bro Dan Pfeiffer said Democrats "have a lot to learn" from Mamdani's campaign.

Counterpoint: Dean Phillips, the only Democrat who challenged Biden in the 2024 primary, disagreed. "Democrats wishing to lose the '26 midterms should promote a 33-year-old socialist devoid of executive experience for mayor of America’s largest city and impeach a president who ended a tyrannical regime's nuclear threat while achieving a cease fire days later," he said.

Analysis: Democrats should definitely listen to Pfeiffer. They need to accept the fact that socialism and anti-Semitism are the future of the Democratic Party. Phillips was wrong about Biden being unfit for office in 2024, and he's wrong now.

Crucial context: Cuomo has pierced nipples.

Perverts never prosper: Anthony Weiner, who was trying to mount (another) political comeback by running for city council in Manhattan, placed fourth in a five-candidate race.

Next on the chopping block: Senate minority leader Chuck Schumer, who may choose to retire rather than get humiliated by AOC in the 2028 Democratic primary.

We do know what the f— we're doing, journalists claim: "Asking questions is literally our job. Demanding facts and answers, instead of just taking a president's word for it," CNN anchor Jake Tapper (est. annual salary: $7.5 million) said this week. He was explaining why the mainstream media refused to believe the White House aides who kept assuring them that Joe Biden was fit to serve as president.

Wait, no it wasn't. The media did take Biden and his enablers at their word despite all evidence to the contrary. In fact, Tapper was lashing out at President Donald Trump for criticizing CNN's shoddy reporting that cast doubt on the success of the U.S. airstrikes on Iran. He just wrote a best-selling book that revealed how journalists were often too afraid (or uninterested) to ask questions about Biden's (readily obvious) cognitive decline.

Brian Stelter, aka "Humpty Dumpty," soared to new heights of self-righteousness. "History is replete with proof that it's imperative to ask for evidence of presidential assertions," he preached. "It is necessary—and patriotic—to question official accounts; to wonder if the public is being misled; and to do so regardless of which party is in power." Stelter was one of many journalists who eagerly embraced the absurd White House talking point about the dangers of "cheap fake" videos that "misleadingly" portrayed Biden as a demented old man bumbling around like an escaped nursing home patient.

Finally, some good news: The reaper's scythe draws near at CNN. The liberal network's overpaid "talent" are in for some deep cuts after its parent company announced plans to spin off its declining assets into a separate company.

Babe of the week: What do you think? (Apologies in advance.)

On a related note: Greta Thunberg, the 22-year-old child activist, has found herself a "man." The happy couple were recently spotted taking a dip in Sicily before Greta set off on her ill-fated cruise to Gaza. He (or mostly likely "they") looks as expected. Congratulations!

She stole my heart on stolen land: Even woke libs deserve love, right? Sean McElwee, the disgraced Democratic messaging guru who took millions from crypto fraudster Sam Bankman-Fried, got married earlier this month to vegan activist Rachel Atcheson, according to a New York Times report headlined, "Debate Is Their Love Language." Subhead: "Rachel Atcheson intended to challenge Sean McElwee over political spending. Instead, they fell in love."

Analysis: Gross. (But don't worry, it gets worse.)

What they're saying: "I've never been to a wedding like this," said Stanley Wang, a regular attendee at the couple's famous poker nights. (McElwee lost his job at the data firm he founded in 2022 amid allegations he was gambling on election outcomes.)

Fact check: You can say that again. What the f...

Crucial context: McElwee told journalist Ben Terris he was "not particularly emotional" after breaking off a previous relationship of seven years because he was looking forward to having a "hot boy summer" with his data buddy David Shor. The ex-girlfriend he broke up with recalled how, several weeks after they started dating, McElwee forced her to listen to the eulogy Ted Kennedy gave at his brother Robert Kennedy's funeral in 1968.

Comey don't play that: James Comey, the disgraced former FBI boss, wrote another shitty crime novel about federal prosecutors who save the world by locking up a bunch of MAGA "mouth breathers" consumed by hate. He says one of his goals in writing the book was to restore "kindness and decency" to the public square. Toward that end, Comey recently went on MSNBC and said that "one of the two political parties is—let me put it nicely—white supremacist adjacent, at a minimum."

Review coming soon in a future edition of the Weekend Beacon newsletter. Subscribe here.

Twitter: @AndrewStilesUSA

Email: [email protected]

If you have friends, tell them to subscribe

to the Stiles Section newsletter.

Send them here.

Stiles Section archive available here.

The post Daddy spanks, the world gives thanks appeared first on .

Posted by Adam Kredo

Georgetown University’s relationship with Qatar has the potential to influence the future diplomats who come out of the School of Foreign Service (SFS), among other institutions, according to a new report detailing ties between the university and radical "Islamist movements and entities associated with the Muslim Brotherhood."

The university, which maintains a satellite campus in Doha, allows Qatar’s Hamas-friendly government to wield outsized influence over several key schools and centers, including SFS, the Center for Contemporary Arab Studies (CCAS), and the Prince Alwaleed Bin Talal Center for Muslim-Christian Understanding (ACMCU).

"Georgetown’s key centers function as platforms promoting political Islam, minimizing the threat of Islamist extremism, and advancing anti-Israel narratives," a new probe by the Institute for the Study of Global Antisemitism and Policy (ISGAP) states. "Affiliations include extensive networks linked to Islamist movements and entities associated with the Muslim Brotherhood."

These influence networks, the report found, extend far past Georgetown’s campus, with consequences that reverberate across the American government: "A substantial number of Georgetown alumni occupy prominent positions in the U.S. State Department, intelligence agencies, media, and NGOs, effectively introducing and reinforcing these ideological perspectives within American foreign policy-making processes."

Georgetown’s Doha campus, founded in 2005 when the school entered into a 10-year, multimillion-dollar arrangement with the Qatar Foundation (QF)—a state-run nonprofit that Doha has used to peddle its influence in American higher education—gives the Qataris wide latitude in the management of the institution.

Under the school’s initial agreement, QF assumed "responsibility for the construction, ownership, and running of the School of Foreign Service campus infrastructure." Georgetown renewed this lucrative partnership in 2015 and then again in 2025, with the current contract slated to extend into 2035.

During a ceremony earlier this year in Doha marking the 20th anniversary of Georgetown’s campus there, the school presented one of its highest honors to Sheikha Moza bint Nasser, QF’s leader and the mother of Qatari Emir Tamim bin Hamad Al Thani. The award came just months after Sheikha Moza praised former Hamas leader Yahya Sinwar, proclaiming, "They thought he died, but he lives."

Qatari cash has also supported the elite school’s ACMCU, established in 1993 within Georgetown’s School of Foreign Service. The ACMCU has longstanding ties to "pro-Islamist and anti-Zionist entities," including U.S.-based groups founded by the Muslim Brotherhood, an international extremist organization that promotes terrorism.

The ACMCU has a long-term financial relationship with the International Institute for Islamic Thought (IIIT), a Virginia-based nonprofit established in 1981 by a network of "Muslim Brotherhood–affiliated figures like Yousef Nada, Ghaleb Himmat, Yusuf al-Qaradawi," according to the report. The IIIT drew scrutiny in the early 2000s for its association with the now-defunct SAAR Foundation, a constellation of Islamic groups the FBI raided that year on suspicion of terrorism financing.

Since that time, Georgetown’s ACMCU has continued to partner with the IIIT, including for a June 2010 seminar at London's Westminster University that was partially organized by both groups.

The IIIT’s financial relationship with Georgetown was publicly acknowledged in April 2017, when the Brotherhood-linked organization’s president and his deputy—Hisham Altalib and Ahmed Alwani—attended the Georgetown 1789 Society, a fellowship recognizing benefactors who "have contributed $1 million or more to Georgetown, as IIIT did in 2017," according to the report.

Nader Hashemi,  the ACMCU’s current director, claimed in 2022 that Israel’s Mossad was behind the attempted assassination of author Salman Rushdie, though it was an Islamic extremist who carried out the attack. Hashemi has "a long history of anti-Zionist statements," has publicly endorsed boycotts of the Jewish state, and "continually accuses Israel of committing genocide, ethnic cleansing, apartheid, and a myriad of other crimes against humanity," according to the report.

Approximately 25 percent of the ACMCU’s graduates enter into government service worldwide, while "many others" pursue work with international NGOs, the private sector, and media industry, according to the report.

"By steering the curriculum, faculty hires, and campus discourse, these external actors gain leverage over how prospective American diplomats are taught to interpret global conflicts and prioritize specific regional agendas," according to ISGAP. "The end result is not simply an academic distortion but a potential compromise of the mechanisms by which U.S. society grooms its statesmen and negotiators."

The findings are likely to increase pressure on Georgetown, which like other prominent universities, has come under fire from the Trump administration and Congress for failing to stem violent anti-Semitism on campus in the wake of Hamas’s Oct. 7 terror spree. Georgetown interim president Robert Groves is slated to testify before Congress next month as lawmakers continue to investigate anti-Semitism and universities’ response to pro-Hamas activism.

Georgetown has publicly reported taking in $927,598,923 from Qatar as of October 2024. But a financial audit by ISGAP conservatively estimates gifts totaling nearly $1.1 billion. "The $146 million gap between the two figures would appear to represent Georgetown’s underreporting" to the federal government, the report reads. The school also appears to have left an additional $102 million in grants to Qatari students at the Doha campus off its official disclosures.

Financial statements from 2021 to 2024 "also reveal significant non-cash benefits from the Qatar Foundation," the state-run nonprofit that "owns and operates Georgetown’s School of Foreign Service campus in Doha’s Education City." ISGAP estimates that Georgetown "underreported approximately $8 million in Qatar Foundation contributions over this period, potentially indicating a broader pattern of incomplete financial disclosure regarding Qatari support."

For ISGAP, the partnership between Georgetown and the QF presents a grave problem for the future of the United States.

"If foreign interests wield undue sway within Georgetown’s corridors, it means that American democracy itself is subtly eroded: the foundational process of diplomatic education risks being co-opted by nontransparent funding streams, ultimately shaping policies and strategies in ways that may run counter to the nation’s long-term security and democratic ideals," the report reads.

The post How Qatari Cash Influences Georgetown—and America's Future Diplomats appeared first on .


Это вчера у Аввы случайно побеседовали за Голявкина, Аваса и тупого доцента, Эббота и Костелло на первой базе и всё вот это вот.
https://avva.livejournal.com/3768692.html?thread=196921460#t196921460










Вчера в своем журнале упомянул новость о грядущем кратном увеличении расходов стран НАТО на вооружения альянса. Цель в 5% от бюджета должна быть достигнута к 2035 году. Так один, скажем вежливо, посетитель у меня в комментах написал, помимо всего прочего, такой прогноз:

к 2035-му году проблема Украины будет давно уже решена (и крайне высока вероятность, что к этому времени будет уже решена и проблема Прибалтики)

Другими словами, тупые пиндосы и европейцы будут вкладывать деньги в заведомо проигранную войну против русских чудо-богатырей. А богатыри не только Украину в бараний рог свернут, а в скором времени и вообще восстановят границы Российской Империи. А, может быть, и дальше пойдут.

На первый взгляд кажется, что таких мечтателей не во всякой больнице найдешь. Но это только на первый взгляд, сейчас докажу. Всем известны успехи футбольной сборной России, ну, еще когда Россию не выбросили вообще из международного большого спорта. Так вот, перед чемпионатом мира в Бразилии в 2014 году был опрос ВЦИОМ о шансах российских футболистов. Не поверите, четверть россиян считали, что Россия выйдет в финал ЧМ!!! Какими словами описать такую наивность, даже не детскую, а младенческую? А верили!

Так чего же теперь удивляться вере в какие-то покорения Украины и других стран, которые вот-вот произойдут? (Правда, если пари подкрепить хоть десятком тыр, мечты могут испариться).

Posted by Adam Kredo

The top-secret Defense Intelligence Agency (DIA) assessment that claimed Iran’s nuclear sites suffered only moderate damage likely relied on faulty information from deceitful Iranian sources, according to several former U.S. intelligence officers, one of whom described the document as so unreliable "you can wipe your ass with it."

The classified DIA report ignited a media firestorm in the days after President Donald Trump authorized precision strikes on Iran’s top three nuclear sites. The findings were leaked to CNN and the New York Times, which presented them as bombshell evidence that the U.S. bombing run only set back Tehran’s nuclear ambitions by several months.

The U.S. intelligence community deemed that initial assessment "low-confidence," a fact CNN omitted from its original piece, and based it solely on satellite imagery and intercepted communications—known as signals intelligence, or SIGINT—from Iranian officials. Shortly after the assessment leaked, Axios reported that communications intercepted by Israel "suggest Iranian military officials have been giving false situation reports to the country's political leadership—downplaying the extent of the damage." Such communications likely made their way into the DIA report, according to three former U.S. intelligence operatives, a current U.S. official, and other veteran national security insiders who spoke to the Washington Free Beacon both on and off the record. Some of them referred to the DIA as the "discount intelligence agency."

"It's basically messaging by the [Islamic Revolutionary Guard Corps], messaging by Tehran," said Michael Pregent, a former intelligence officer with U.S. Central Command who operated in the Middle East for nearly 30 years. "DIA is taking a SIGINT report from the National Security Agency ... and putting together an assessment to leak. I know it’s messaging, the Iranians know it’s messaging, and for some reason, NSA believes it’s actual f—ing intelligence."

A current U.S. official familiar with the ongoing damage assessment process said that the DIA’s findings—as well as "the partisan hit job published by CNN"—have been "completely debunked" over the past 24 hours, including by the International Atomic Energy Agency (IAEA).

"It has now been established by the IAEA that Iran’s nuclear program suffered ‘enormous damage’ and the ‘centrifuges ... are completely destroyed,’" the official told the Free Beacon. "The military operation carried out by the United States was a huge success and we are grateful to our troops who valiantly carried out the president’s mission."

In addition to the IAEA, Central Intelligence Agency director John Ratcliffe announced that the CIA learned from "an historically reliable and accurate source/method that several key Iranian nuclear facilities were destroyed and would have to be rebuilt over the course of years."

Another former American intelligence officer characterized the DIA’s findings as "embarrassing" and said the analysts responsible for assembling the report failed to "understand what they were looking at," particularly regarding Fordow, the mountain bunker buried under more than 300 feet of concrete.

"You're not going to see a huge hole down to Hell," said the former intelligence officer, speaking only on background to discuss U.S. intelligence-gathering methods. "You're not going to see that they dropped these bombs in specific locations so that they would detonate well underground, because it was such a deeply buried facility and under so much concrete."

"It's clear that those people had no idea what they were talking about, and I agree with the fact that undoubtedly all these [Iranians] knew their phones were being monitored by multiple countries and acted accordingly," the former operative told the Free Beacon. "So, nothing that they said should have been used as any sort of gospel."

The former intelligence officer said that the DIA’s categorization of its own assessment renders it effectively useless.

"The fact that the DIA’s assessment was deemed ‘low-confidence’ means that you can wipe your ass with it," the source added. "You probably get more information from a Free Beacon article."

A third former U.S. official who worked primarily on the Iran portfolio agreed that the initial DIA report included "Iranians repeating propaganda to each other, as they have done throughout the war and preceding preparations."

Sen. Tom Cotton (R., Ark.) told reporters the contested DIA report "was preliminary" and contained "numerous intelligence gaps" following a Thursday briefing with senior Trump administration officials on Capitol Hill.

Michael Rubin, a former Pentagon adviser, noted that DIA analysts’ reliance on intercepted communications has been a longstanding concern.

"There's a long pattern within the DIA in which analysts listen so much to their targets that they actually start to rationalize, if not believe them," said Rubin, now a senior fellow at the American Enterprise Institute. "This is why so many DIA Middle East analysts become outspoken conspiracy theorists or advocates for normalizing ties with groups like Hamas and Hezbollah. Too much Iran leads to becoming analytically—if not morally—unhinged."

The leak itself, Rubin said, likely came from a DIA agent who "wanted to write the first draft of history because he or she knew the assessment would likely be challenged."

For Simone Ledeen, a former deputy assistant secretary of defense for the Middle East, the situation raises concerns about the American intelligence community and its inherent biases.

"At a fundamental level, a lot of our analytic corps needs to be completely destroyed and rebuilt," Ledeen told the Free Beacon. "A lot of these people are coming from you know which schools, so they're totally indoctrinated and they don't know what they're talking about because they're not properly educated anyway."

A senior DIA official told the Free Beacon that the assessment was not meant for public consumption and that the agency will work to find whomever leaked it to the press.

"This is a preliminary, low-confidence assessment—not a final conclusion—and will continue to be refined as additional intelligence becomes available," the official said. "We have still not been able to review the physical sites themselves, which will give us the best indication. We are working with the FBI and other authorities to investigate the unauthorized disclosure of classified information."

The post Classified Report That Suggested Iranian Nuclear Program Still Intact Likely Relied on Faulty Info From Iranian Sources, Former Intel Officers Say appeared first on .

Posted by Meghan Blonder

President Donald Trump hopes for peace in the Middle East but isn’t "afraid to use strength" again if necessary, White House press secretary Karoline Leavitt said Thursday.

"We look forward to sustaining a long and durable peace in the region and the president wants to do that through a diplomatic solution. But as he proved on Saturday night, he is not afraid to use strength if we need to do it," Leavitt said during Thursday’s press briefing.

Her comments came in response to a Washington Free Beacon report that the United States and Israel are jointly monitoring Iran and are prepared to resume strikes if the regime attempts to rebuild its nuclear or ballistic missile programs.

"Does that align with the president's thinking?" the Free Beacon's Collin Anderson asked.

"The president … views the Middle East on its way to peace and prosperity, and the president used strength on Saturday night. The whole world saw that the United States is indeed the most lethal fighting force in the world with those precision strikes on Saturday evening. But the president wants peace. He always has," Leavitt said.

The president and his team are in continued communication with Iranian leaders as well as Gulf and Arab partners to negotiate the future of the Islamic Republic, according to Leavitt. Trump hopes diplomatic negotiations will lead to a "new era" of peace in the Middle East, she added.

"As for our alliance with the State of Israel and that friendship and that partnership between the United States and the State of Israel, I would argue it has never been stronger," Leavitt said.

Trump also acknowledged Wednesday that he was willing to carry out additional strikes on Iran if it attempted to rebuild its nuclear program.

"But I'm not going to have to worry about that," he added. "It's gone for years, years. Very tough to rebuild."

The post White House Tells Free Beacon: Trump Wants Middle East Peace but Is ‘Not Afraid To Use Strength’ Again appeared first on .

Posted by Tori Noble

Things are speeding up in generative AI legal cases, with two judicial opinions just out on an issue that will shape the future of generative AI: whether training gen-AI models on copyrighted works is fair use. One gets it spot on; the other, not so much, but fortunately in a way that future courts can and should discount.

The core question in both cases was whether using copyrighted works to train Large Language Models (LLMs) used in AI chatbots is a lawful fair use. Under the US Copyright Act, answering that question requires courts to consider:

  1. whether the use was transformative;
  2. the nature of the works (Are they more creative than factual? Long since published?)
  3. how much of the original was used; and
  4. the harm to the market for the original work.

In both cases, the judges focused on factors (1) and (4).

The right approach

In Bartz v. Anthropic, three authors sued Anthropic for using their books to train its Claude chatbot. In his order deciding parts of the case, Judge William Alsup confirmed what EFF has said for years: fair use protects the use of copyrighted works for training because, among other things, training gen-AI is “transformative—spectacularly so” and any alleged harm to the market for the original is pure speculation. Just as copying books or images to create search engines is fair, the court held, copying books to create a new, “transformative” LLM and related technologies is also protected:

[U]sing copyrighted works to train LLMs to generate new text was quintessentially transformative. Like any reader aspiring to be a writer, Anthropic’s LLMs trained upon works not to race ahead and replicate or supplant them—but to turn a hard corner and create something different. If this training process reasonably required making copies within the LLM or otherwise, those copies were engaged in a transformative use.

Importantly, Bartz rejected the copyright holders’ attempts to claim that any model capable of generating new written material that might compete with existing works by emulating their “sweeping themes, “substantive points,” or “grammar, composition, and style” was an infringement machine. As the court rightly recognized, building gen-AI models that create new works is beyond “anything that any copyright owner rightly could expect to control.” 

There’s a lot more to like about the Bartz ruling, but just as we were digesting it Kadrey v. Meta Platforms came out. Sadly, this decision bungles the fair use analysis.

A fumble on fair use

Kadrey is another suit by authors against the developer of an AI model, in this case Meta’s ‘Llama’ chatbot. The authors in Kadrey asked the court to rule that fair use did not apply.

Much of the Kadrey ruling by Judge Vince Chhabria is dicta—meaning, the opinion spends many paragraphs on what it thinks could justify ruling in favor of the author plaintiffs, if only they had managed to present different facts (rather than pure speculation). The court then rules in Meta’s favor because the plaintiffs only offered speculation. 

But it makes a number of errors along the way to the right outcome. At the top, the ruling broadly proclaims that training AI without buying a license to use each and every piece of copyrighted training material will be “illegal” in “most cases.” The court asserted that fair use usually won’t apply to AI training uses even though training is a “highly transformative” process, because of hypothetical “market dilution” scenarios where competition from AI-generated works could reduce the value of the books used to train the AI model..

That theory, in turn, depends on three mistaken premises. First, that the most important factor for determining fair use is whether the use might cause market harm. That’s not correct. Since its seminal 1994 opinion in Cambell v Acuff-Rose, the Supreme Court has been very clear that no single factor controls the fair use analysis.

Second, that an AI developer would typically seek to train a model entirely on a certain type of work, and then use that model to generate new works in the exact same genre, which would then compete with the works on which it was trained, such that the market for the original works is harmed. As the Kadrey ruling notes, there was no evidence that Llama was intended to to, or does, anything like that, nor will most LLMs for the exact reasons discussed in Bartz.

Third, as a matter of law, copyright doesn't prevent “market dilution” unless the new works are otherwise infringing. In fact, the whole purpose of copyright is to be an engine for new expression. If that new expression competes with existing works, that’s a feature, not a bug.

Gen-AI is spurring the kind of tech panics we’ve seen before; then, as now, thoughtful fair use opinions helped ensure that copyright law served innovation and creativity. Gen-AI does raise a host of other serious concerns about fair labor practices and misinformation, but copyright wasn’t designed to address those problems. Trying to force copyright law to play those roles only hurts important and legal uses of this technology.

In keeping with that tradition, courts deciding fair use in other AI copyright cases should look to Bartz, not Kadrey.

Posted by Matthew Xiao

The Department of Justice filed a lawsuit Wednesday challenging a Minnesota law that allows illegal immigrants to qualify for in-state college tuition and state financial aid, arguing that the policy violates federal law and discriminates against citizens.

The lawsuit targets the Minnesota Dream Act, signed by then–governor Mark Dayton (D.) in 2013, which permits some illegal immigrants who graduate from Minnesota high schools or earn GEDs in the state to pay reduced tuition and access state financial aid. The DOJ's lawsuit accuses the Minnesota law of violating a federal statute that prohibits higher education institutions from offering benefits to illegal immigrants that aren't available to U.S. citizens.

"No state can be allowed to treat Americans like second-class citizens in their own country by offering financial benefits to illegal aliens," Attorney General Pam Bondi said. "The Department of Justice just won on this exact issue in Texas, and we look forward to taking this fight to Minnesota in order to protect the rights of American citizens first."

On June 4, Texas agreed to stop enforcing the Texas Dream Act—a law enacted in 2001 that provided in‑state tuition to illegal immigrants—just hours after the DOJ sued the state over the law. The Trump administration also launched a similar legal challenge last week in Kentucky, Fox News reported.

The three lawsuits stem from President Donald Trump's executive orders aimed at ensuring illegal aliens do not receive taxpayer benefits or preferential treatment, Fox News noted.

One order, titled "Ending Taxpayer Subsidization of Open Borders," directs federal agencies to ensure that "no taxpayer-funded benefits go to unqualified aliens." The other, "Protecting American Communities From Criminal Aliens," instructs officials to stop enforcing any unlawful state or local policies that favor non-citizens—including in-state tuition programs.

The Trump administration has ramped up its crackdown on illegal immigration, with migrant encounters as of February plummeting to the lowest level since 2017. Federal officials have more than doubled the average number of daily arrests—from 660 during the president's first 100 days to 1,200 this month, CBS News reported. The White House said it aims to reach 3,000 arrests per day.

The post DOJ Sues Minnesota Over Law Granting In-State Tuition, Financial Aid to Illegal Immigrants appeared first on .

Posted by Dan Mitchell

While Poland in recent years has received some very positive attention for the way it is converging with richer countries, the same is not true for Hungary.

Indeed, it recently got some negative publicity. According to data from the European Commission, it is now the poorest E.U. country, when measured on the basis of household consumption.

Here’s the map showing Hungary at 72 percent of the E.U. average.

An article from the Economic Times examines this new data and is not flattering.

Hungary has officially become the poorest country in the European Union in terms of household welfare… The numbers show that Hungarian households now consume just 72% of the EU average, which is the lowest among all 27 member states, according to the report. …While Hungary’s GDP is currently at about 77% of the EU average, which is above several low-income EU nations, its households continue to remain poorer in terms of consumption… This gap reflects that Hungary’s economic output is not transforming into real benefits for Hungarian families, according to the report. …Under Orbán’s leadership, “the state-owned industries have been hollowed out, public subsidies redirected to political allies, and EU funds commandeered by power networks close to the government,” as reported.

Back in 2022, Joseph Sternberg of the Wall Street Journal opined about Hungary not being a role model because Orban takes so much money from Brussels.

One of the stranger phenomena of the age is that a certain kind of conservative now holds out Hungary as the model of Christian governance to which the West should aspire. …The case for Orbánism is that Mr. Orbán fights. His international reputation and some of his domestic success are built on a string of fierce political conflicts with European Union grandees in Brussels and across the bloc’s other member countries. Mr. Orbán resisted the EU’s opening to mass migration from the Middle East in 2015. He has crossed swords with civil-society goo-goos over laws aimed at reducing the political influence of the likes of Hungarian-born left-wing billionaire George Soros… All of this is deeply offensive to so-called good Europeans in politics, academia and the media. …The only problem for the credibility of Mr. Orbán’s fans is that he never actually fights all that hard.  …the EU remains popular in Hungary. Some 47% of Hungarian respondents had a positive view of the EU and only 13% had a negative view… Mr. Orbán’s claim on EU resources turns the sovereignty argument on its head. What’s at stake in Hungary isn’t the sovereignty of Hungarians to make decisions about immigration or social policy. No one is stopping them, provided they’re willing to fund their own government.

Since I wrote back in 2021 that Denmark was much more market-oriented than Hungary, I obviously don’t feel any reflexive need to defend Orban or his government.

That being said, there has been some convergence. Looking at 2010 data (when Orban began his current reign), Hungary was at 57 percent of the OECD average for consumption. A decade later, it was about 63 percent of the average.

The problem for Hungary is that it could be converging faster.

As you can see from the Fraser Institute’s data, there was a big improvement in economic liberty after the collapse of the Soviet Empire. But, for all intents and purposes, there’s been no improvement over the past two decades.

Ranking #55 in the world is not bad, but it’s also not a recipe for rapid convergence.

Ideally, Hungary should copy the policies of top-ranked Singapore. But copying 20th-ranked Estonia also would be a big step in the right direction.

 

Posted by Matthew Xiao

The U.S. strike on Iran's Fordow nuclear site sent bombs directly down exposed vent shafts after blowing off concrete covers, according to Defense Secretary Pete Hegseth.

Hegseth "says the photos showing the groups of 3 holes in the ground at the Iranian Fordow nuclear facility are actually exposed ventilation shafts after U.S. bombs blew off concrete caps Iranians placed, then U.S. bombs went down the center exposed vent holes," Fox News's Bill Melugin wrote Thursday morning on X.

The revelation comes as U.S. and Israeli officials have said that the U.S. strike dealt a crippling blow to Iran's nuclear program. Israel's Atomic Energy Commission assessed the Fordow site as "inoperable" and said the strike "set back Iran's ability to develop nuclear weapons by many years." A CIA report supported that view, with Director John Ratcliffe saying Iran's nuclear program is "severely damaged," setting back the Islamic Republic's ambitions by years.

President Donald Trump said Wednesday that Iran no longer has a nuclear program and warned that any attempt to restart it would trigger more U.S. attacks.

American forces on Saturday used seven B‑2 stealth bombers to drop 14 "bunker-buster" bombs and launched at least 30 Tomahawk cruise missiles against Iran's Esfahan and Natanz nuclear sites, according to reports.

Joint Chiefs of Staff chairman Gen. Dan Caine said Thursday morning that the United States spent 15 years developing the heavy-duty bunker busters, starting the program in 2009 after learning about Iran's construction of the Fordow nuclear facility, CBS News's Jennifer Jacobs reported.

Pentagon officials "knew from the very first days what [the facility] was for—you do not build a multi-layered underground bunker complex with centrifuges and other equipment in a mountain for any peaceful purpose," Caine said.

Update Fri., June 27, 5:28 p.m.:
This piece previously misspelled CIA director John Ratcliffe's name.

The post Hegseth: US Bombs Struck Iran's Fordow Nuclear Facility Through Vent Shafts After Blasting Off Concrete Caps appeared first on .

vit_r: default (Default)
Paulus 2025

Ближневосточный очень мирный процесс


Никакой отсебятины. Только цитаты.

Война и мир на Ближнем Востоке, Дина Лиснянская, 2025-06-23:
17:49
Катар, в котором, помимо офисов политбюро ХАМАСа, располагается крупнейшая на Ближнем Востоке база ВВС США, объявил о закрытии воздушного пространства страны до дальнейшего уведомления.

18:43
Авиабаза Аль-Удейд в Катаре является самой большой американской базой на Ближнем Востоке.

Сейчас в Дохе, столице Катара звучат перехваты иранских ракет, по арабским сообщениям.

18:50
А сейчас Иран атакует ракетами и Бахрейн.

18:52
10 ракет по Катару, ракеты по Бахрейну, а также, одна ракета [...] по американской базе в Ираке.

19:13
Катар осудил ракетный обстрел своей территории, подчеркнул, что в результате него никто не пострадал, оставил за собой право на ответный удар.

20:02
Саудовская Аравия осудила "неприемлемую" атаку Ирана на Катар, "которая не может быть оправдана никакими обстоятельствами".

Read more... )

Posted by Paige Collings

This week, EFF joined EDRi and nearly 50 civil society organizations urging the European Commission’s President Ursula von der Leyen, Executive Vice President Henna Virkunnen, and Commissioners Michael McGrath and Hadja Lahbib to take immediate action and defend human rights in Hungary.

The European Commission has a responsibility to protect EU fundamental rights, including the rights of LGBTQ+ individuals in Hungary and across the Union

With Budapest Pride just two days away, Hungary has criminalized Pride marches and is planning to deploy real-time facial recognition technology to identify those participating in the event. This is a flagrant violation of fundamental rights, particularly the rights to free expression and assembly.

On April 15, a new amendment package went into effect in Hungary which authorizes the use of real-time facial recognition to identify protesters at ‘banned protests’ like LGBTQ+ events, and includes harsh penalties like excessive fines and imprisonment. This is prohibited by the EU Artificial Intelligence (AI) Act, which does not permit the use of real-time face recognition for these purposes.

This came on the back of members of Hungary’s Parliament rushing through three amendments in March to ban and criminalize Pride marches and their organizers, and permit the use of real-time facial recognition technologies for the identification of protestors. These amendments were passed without public consultation and are in express violation of the EU AI Act and Charter of Fundamental Rights. In response, civil society organizations urged the European Commission to put interim measures in place to rectify the violation of fundamental rights and values. The Commission is yet to respond—a real cause of concern.

This is an attack on LGBTQ+ individuals, as well as an attack on the rights of all people in Hungary. The letter urges the European Commission to take the following actions:

  • Open an infringement procedure against any new violations of EU law, in particular the violation of Article 5 of the AI Act
  • Adopt interim measures on ongoing infringement against Hungary’s 2021 anti LGBT law which is used as a legal basis for the ban on LGBTQIA+ related public assemblies, including Budapest Pride.

There's no question that, when EU law is at stake, the European Commission has a responsibility to protect EU fundamental rights, including the rights of LGBTQ+ individuals in Hungary and across the Union. This includes ensuring that those organizing and marching at Pride in Budapest are safe and able to peacefully assemble and protest. If the EU Commission does not urgently act to ensure these rights, it risks hollowing out the values that the EU is built from.

Read our full letter to the Commission here.

Posted by ARRAY(0x55b59e684588)

Can the cops get your online data? In short, yes. There are a variety of US federal and state laws which give law enforcement powers to obtain information that you provided to online services. But, there are steps you as a user and/or as a service provider can take to improve online privacy.

Law enforcement demanding access to your private online data goes back to the beginning of the internet. In fact, one of  EFF’s first cases, Steve Jackson Games v. Secret Service, exemplified the now all-too-familiar story where unfounded claims about illegal behavior resulted in overbroad seizures of user messages. But it’s not the ’90s anymore, the internet has become an integral part of everyone’s life. Everyone now relies on organizations big and small to steward our data, from huge service providers like Google, Meta, or your ISP, to hobbyists hosting a blog or Mastodon server

There is no “cloud,” just someone else's computer—and when the cops come knocking on their door, these hosts need to be willing to stand up for privacy, and know how to do so to the fullest extent under the law. These legal limits are also important for users to know, not only to mitigate risks in their security plan when choosing where to share data, but to understand whether these hosts are going to bat for them. Taking action together, service hosts and users can curb law enforcement getting more data than they’re allowed, protecting not just themselves but targeted populations, present and future.

This is distinct from law enforcement’s methods of collecting public data, such as the information now being collected on student visa applicants. Cops may use social media monitoring tools and sock puppet accounts to collect what you share publicly, or even within “private” communities. Police may also obtain the contents of communication in other ways that do not require court authorization, such as monitoring network traffic passively to catch metadata and possibly using advanced tools to partially reveal encrypted information. They can even outright buy information from online data brokers. Unfortunately there are few restrictions or oversight for these practices—something EFF is fighting to change.

Below however is a general breakdown of the legal processes used by US law enforcement for accessing private data, and what categories of private data these processes can disclose. Because this is a generalized summary, it is neither exhaustive nor should be considered legal advice. Please seek legal help if you have specific data privacy and security needs.

Type of data

Process used

Challenge prior to disclosure?

Proof needed

Subscriber information

Subpoena

Yes

Relevant to an investigation

Non-content information, metadata

Court order; sometimes subpoena

Yes

Specific and articulable facts that info is relevant to an investigation

Stored content

Search warrant

No

Probable cause that info will provide evidence of a crime

Content in transit

Super warrant

No

Probable cause plus exhaustion and minimization

Types of Data that Can be Collected

The laws protecting private data online generally follow a pattern: the more sensitive the personal data is, the greater factual and legal burden police have to meet before they can obtain it. Although this is not exhaustive, here are a few categories of data you may be sharing with services, and why police might want to obtain it.

    • Subscriber Data: Information you provide in order to use the service. Think about ID or payment information, IP address location, email, phone number, and other information you provided when signing up. 
      • Law enforcement can learn who controls an anonymous account, and find other service providers to gather information from.
    • Non-content data, or "metadata": This is saved information about your interactions on the service; like when you used the service, for how long, and with whom. Analogous to what a postal worker can infer from a sealed letter with addressing information.
      • Law enforcement can use this information to infer a social graph, login history, and other information about a suspect’s behavior.
      • Stored content: This is the actual content you are sending and receiving, like your direct message history or saved drafts. This can cover any private information your service provider can access. 
        • This most sensitive data is collected to reveal criminal evidence. Overly broad requests also allow for retroactive searches, information on other users, and can take information out of its original context. 
      • Content in transit: This is the content of your communications as it is being communicated. This real-time access may also collect info which isn’t typically stored by a provider, like your voice during a phone call.
        • Law enforcement can compel providers to wiretap their own services for a particular user—which may also implicate the privacy of users they interact with.

    Legal Processes Used to Get Your Data

    When US law enforcement has identified a service that likely has this data, they have a few tools to legally compel that service to hand it over and prevent users from knowing information is being collected.

    Subpoena

    Subpoenas are demands from a prosecutor, law enforcement, or a grand jury which do not require approval of a judge before being sent to a service. The only restriction is this demand be relevant to an investigation. Often the only time a court reviews a subpoena is when a service or user challenges it in court.

    Due to the lack of direct court oversight in most cases, subpoenas are prone to abuse and overreach. Providers should scrutinize such requests carefully with a lawyer and push back before disclosure, particularly when law enforcement tries to use subpoenas to obtain more private data, such as the contents of communications.

    Court Order

    This is a similar demand to subpoenas, but usually pertains to a specific statute which requires a court to authorize the demand. Under the Stored Communications Act, for example, a court can issue an order for non-content information if police provide specific facts that the information being sought is relevant to an investigation. 

    Like subpoenas, providers can usually challenge court orders before disclosure and inform the user(s) of the request, subject to law enforcement obtaining a gag order (more on this below). 

    Search Warrant

    A warrant is a demand issued by a judge to permit police to search specific places or persons. To obtain a warrant, police must submit an affidavit (a written statement made under oath) establishing that there is a fair probability (or “probable cause”) that evidence of a crime will be found at a particular place or on a particular person. 

    Typically services cannot challenge a warrant before disclosure, as these requests are already approved by a magistrate. Sometimes police request that judges also enter gag orders against the target of the warrant that prevent hosts from informing the public or the user that the warrant exists.

    Super Warrant

    Police seeking to intercept communications as they occur generally face the highest legal burden. Usually the affidavit needs to not only establish probable cause, but also make clear that other investigation methods are not viable (exhaustion) and that the collection avoids capturing irrelevant data (minimization). 

    Some laws also require high-level approval within law enforcement, such as leadership, to approve the request. Some laws also limit the types of crimes that law enforcement may use wiretaps in while they are investigating. The laws may also require law enforcement to periodically report back to the court about the wiretap, including whether they are minimizing collection of non-relevant communications. 

    Generally these demands cannot be challenged while wiretapping is occurring, and providers are prohibited from telling the targets about the wiretap. But some laws require disclosure to targets and those who were communicating with them after the wiretap has ended. 

    Gag orders

    Many of the legal authorities described above also permit law enforcement to simultaneously prohibit the service from telling the target of the legal process or the general public that the surveillance is occurring. These non-disclosure orders are prone to abuse and EFF has repeatedly fought them because they violate the First Amendment and prohibit public understanding about the breadth of law enforcement surveillance.

    How Services Can (and Should) Protect You

    This process isn't always clean-cut, and service providers must ultimately comply with lawful demands for user’s data, even when they challenge them and courts uphold the government’s demands. 

    Service providers outside the US also aren’t totally in the clear, as they must often comply with US law enforcement demands. This is usually because they either have a legal presence in the US or because they can be compelled through mutual legal assistance treaties and other international legal mechanisms. 

    However, services can do a lot by following a few best practices to defend user privacy, thus limiting the impact of these requests and in some cases make their service a less appealing door for the cops to knock on.

    Put Cops through the Process

    Paramount is the service provider's willingness to stand up for their users. Carving out exceptions or volunteering information outside of the legal framework erodes everyone's right to privacy. Even in extenuating and urgent circumstances, the responsibility is not on you to decide what to share, but on the legal process. 

    Smaller hosts, like those of decentralized services, might be intimidated by these requests, but consulting legal counsel will ensure requests are challenged when necessary. Organizations like EFF can sometimes provide legal help directly or connect service providers with alternative counsel.

    Challenge Bad Requests

    It’s not uncommon for law enforcement to overreach or make burdensome requests. Before offering information, services can push back on an improper demand informally, and then continue to do so in court. If the demand is overly broad, violates a user's First or Fourth Amendment rights, or has other legal defects, a court may rule that it is invalid and prevent disclosure of the user’s information.

    Even if a court doesn’t invalidate the legal demand entirely, pushing back informally or in court can limit how much personal information is disclosed and mitigate privacy impacts.

    Provide Notice 

    Unless otherwise restricted, service providers should give notice about requests and disclosures as soon as they can. This notice is vital for users to seek legal support and prepare a defense.

    Be Clear With Users 

    It is important for users to understand if a host is committed to pushing back on data requests to the full extent permitted by law. Privacy policies with fuzzy thresholds like "when deemed appropriate" or “when requested” make it ambiguous if a user’s right to privacy will be respected. The best practices for providers not only require clarity and a willingness to push back on law enforcement demands, but also a commitment to be transparent with the public about law enforcement’s demands. For example, with regular transparency reports breaking down the countries and states making these data requests.

    Social media services should also consider clear guidelines for finding and removing sock puppet accounts operated by law enforcement on the platform, as these serve as a backdoor to government surveillance.

    Minimize Data Collection 

    You can't be compelled to disclose data you don’t have. If you collect lots of user data, law enforcement will eventually come demanding it. Operating a service typically requires some collection of user data, even if it’s just login information. But the problem is when information starts to be collected beyond what is strictly necessary. 

    This excess collection can be seen as convenient or useful for running the service, or often as potentially valuable like behavioral tracking used for advertising. However, the more that’s collected, the more the service becomes a target for both legal demands and illegal data breaches. 

    For data that enables desirable features for the user, design choices can make privacy the default and give users additional (preferably opt-in) sharing choices. 

    Shorter Retention

    As another minimization strategy, hosts should regularly and automatically delete information when it is no longer necessary. For example, deleting logs of user activity can limit the scope of law enforcement’s retrospective surveillance—maybe limiting a court order to the last 30 days instead of the lifetime of the account. 

    Again design choices, like giving users the ability to send disappearing messages and deleting them from the server once they’re downloaded, can also further limit the impact of future data requests. Furthermore, these design choices should have privacy-preserving default

    Avoid Data Sharing 

    Depending on the service being hosted there may be some need to rely on another service to make everything work for users. Third-party login or ad services are common examples with some amount of tracking built in. Information shared with these third-parties should also be minimized and avoided, as they may not have a strict commitment to user privacy. Most notoriously, data brokers who sell advertisement data can provide another legal work-around for law enforcement by letting them simply buy collected data across many apps. This extends to decisions about what information is made public by default, thus accessible to many third parties, and if that is clear to users.

    (True) End-to-End Encryption

    Now that HTTPS is actually everywhere, most traffic between a service and a user can be easily secured—for free. This limits what onlookers can collect on users of the service, since messages between the two are in a secure “envelope.” However, this doesn’t change the fact the service is opening this envelope before passing it along to other users, or returning it to the same user. With each opened message, this is more information to defend.

    Better, is end-to-end encryption (e2ee), which just means providing users with secure envelopes that even the service provider cannot open. This is how a featureful messaging app like Signal can respond to requests with only three pieces of information: the account identifier (phone number), the date of creation, and the last date of access. Many services should follow suit and limit access through encryption.

    Note that while e2ee has become a popular marketing term, it is simply inaccurate for describing any encryption use designed to be broken or circumvented. Implementing “encryption backdoors” to break encryption when desired, or simply collecting information before or after the envelope is sealed on a user’s device (“client-side scanning”) is antithetical to encryption. Finally, note that e2ee does not protect against law enforcement obtaining the contents of communications should they gain access to any device used in the conversation, or if message history is stored on the server unencrypted.

    Protecting Yourself and Your Community

    As outlined, often the security of your personal data depends on the service providers you choose to use. But as a user you do still have some options. EFF’s Surveillance Self-Defense is a maintained resource with many detailed steps you can take. In short, you need to assess your risks, limit the services you use to those you can trust (as much as you can), improve settings, and when all else fails, accessorize with tools that prevent data sharing in the first place—like EFF’s Privacy Badger browser extension.

    Remember that privacy is a team sport. It’s not enough to make these changes as an individual, it’s just as important to share and educate others, as well as fighting for better digital privacy policy on all levels of governance. Learn, get organized, and take action.

     

    веревки

    Jun. 26th, 2025 06:35 am[syndicated profile] avva_feed
    ropes.jpg

    И красивая мозаика, и задачка на внимание. Сколько веревок?

    веревки

    Jun. 26th, 2025 08:35 am[personal profile] avva
    avva: (Default)
    ropes.jpg

    И красивая мозаика, и задачка на внимание. Сколько веревок?

    Posted by ARRAY(0x55b59e70cb60)

    On June 5th, the FBI released a PSA titled “Home Internet Connected Devices Facilitate Criminal Activity.” This PSA largely references devices impacted by the latest generation of BADBOX malware (as named by HUMAN’s Satori Threat Intelligence and Research team) that EFF researchers also encountered primarily on Android TV set-top boxes. However, the malware has impacted tablets, digital projectors, aftermarket vehicle infotainment units, picture frames, and other types of IoT devices. 

    One goal of this malware is to create a network proxy on the devices of unsuspecting buyers, potentially making them hubs for various potential criminal activities, putting the owners of these devices at risk from authorities. This malware is particularly insidious, coming pre-installed out of the box from major online retailers such as Amazon and AliExpress. If you search “Android TV Box” on Amazon right now, many of the same models that have been impacted are still up being sold by sellers of opaque origins. Facilitating the sale of these devices even led us to write an open letter to the FTC, urging them to take action on resellers.

    The FBI listed some indicators of compromise (IoCs) in the PSA for consumers to tell if they were impacted. But the average person isn’t running network detection infrastructure in their homes, and cannot hope to understand what IoCs can be used to determine if their devices generate “unexplained or suspicious Internet traffic.” Here, we will attempt to help give more comprehensive background information about these IoCs. If you find any of these on devices you own, then we encourage you to follow through by contacting the FBI's Internet Crime Complaint Center (IC3) at www.ic3.gov.

    The FBI lists these IoC:

    • The presence of suspicious marketplaces where apps are downloaded.
    • Requiring Google Play Protect settings to be disabled.
    • Generic TV streaming devices advertised as unlocked or capable of accessing free content.
    • IoT devices advertised from unrecognizable brands.
    • Android devices that are not Play Protect certified.
    • Unexplained or suspicious Internet traffic.

    The following adds context to above, as well as some added IoCs we have seen from our research.

    Play Protect Certified

    “Android devices that are not Play Protect certified” refers to any device brand or partner not listed here: https://www.android.com/certified/partners/. Google subjects devices to compatibility and security tests in their criteria for inclusion in the Play Protect program, though the mentioned list’s criteria are not made completely transparent outside of Google. But this list does change, as we saw with the tablet brand we researched being de-listed. This encompasses “devices advertised from unrecognizable brands.” The list includes international brands and partners as well.

    Outdated Operating Systems

    Other issues we saw were really outdated Android versions. For posterity, Android 16 just started rolling out. Android 9-12 appeared to be the most common versions routinely used. This could be a result of “copied homework” from previous legitimate Android builds, and often come with their own update software that can present a problem on its own and deliver second-stage payloads for device infection in addition to what it is downloading and updating on the device.

    You can check which version of Android you have by going to Settings and searching “Android version”.

    Android App Marketplaces

    We’ve previously argued how the availability of different app marketplaces leads to greater consumer choice, where users can choose alternatives even more secure than the Google Play Store. While this is true, the FBI’s warning about suspicious marketplaces is also prudent. Avoiding “downloading apps from unofficial marketplaces advertising free streaming content” is sound (if somewhat vague) advice for set-top boxes, yet this recommendation comes without further guidelines on how to identify which marketplaces might be suspicious for other Android IoT platforms. Best practice is to investigate any app stores used on Android devices separately, but to be aware that if a suspicious Android device is purchased, it can contain preloaded app stores that mimic the functionality of legitimate ones but also contain unwanted or malicious code.

    Models Listed from the Badbox Report

    We also recommend looking up device names and models that were listed in the BADBOX 2.0 report. We investigated the T95 models along with other independent researchers that initially found this malware present. A lot of model names could be grouped in families with the same letters but different numbers. These operations are iterating fast, but the naming conventions are often lazy in this respect. If you're not sure what model you own, you can usually find it listed on a sticker somewhere on the device. If that fails, you may be able to find it by pulling up the original receipt or looking through your order history.

    A Note from Satori Researchers:

    “Below is a list of device models known to be targeted by the threat actors. Not all devices of a given model are necessarily infected, but Satori researchers are confident that infections are present on some devices of the below device models:”

    List of Impacted Models

    List of Potentially Impacted Models

    Broader Picture: The Digital Divide

    Unfortunately, the only way to be sure that an Android device from an unknown brand is safe is not to buy it in the first place. Though initiatives like the U.S. Cyber Trust Mark are welcome developments intended to encourage demand-side trust in vetted products, recent shake ups in federal regulatory bodies means the future of this assurance mark is unknown. This means those who face budget constraints and have trouble affording top-tier digital products for streaming content or other connected purposes may rely on cheaper imitation products that are rife with not only vulnerabilities, but even come out-of-the-box preloaded with malware. This puts these people disproportionately at legal risk when these devices are used to provide the buyers’ home internet connection as a proxy for nefarious or illegal purposes.

    Cybersecurity and trust that the products we buy won’t be used against us is essential: not just for those that can afford name-brand digital devices, but for everyone. While we welcome the IoCs that the FBI has listed in its PSA, more must be done to protect consumers from a myriad of dangers that their devices expose them to.

    gmz: (Default)

    Если вы любите цветы в столовой, то орхидеи лучший выбор. Все остальные надо менять через несколько дней, а орхидеи стоят (по крайней мере у нас) два месяца и больше. Стоит такой горшок с букетом чуть более 20 баксов, т.е. в день треть бакса.

    Очень люблю этот рассказ Виктора Голявкина. Всего одна страница. Весь окутан особым шармом, какого больше ни у кого нет. Смешно, но не так, что вот вслух хочется хохотать, а как-то весело-смешно.

    Наверное, я хожу вокруг да около, но правильно просто сказать, что я не понимаю, как в таком стиле писать и откуда такая прекрасная легкость берется и как можно догадаться остановить рассказ на той фразе, где он заканчивается. А меня всегда притягивает то, что я не понимаю.

    birds.png

    Profile

    ave_pequena: (Default)
    ave_pequena

    July 2024

    S M T W T F S
     1234 56
    78910111213
    14151617181920
    21222324252627
    28293031   

    Expand Cut Tags

    No cut tags
    OSZAR »